Hardware Architectures proposed for Cryptosystems Based on Hyperelliptic Curves
نویسنده
چکیده
Security issues play an important role in almost all modern communication and computer networks. The foundation of IT security are cryptographic systems, for example hyperelliptic curves cryptosystems (HECC). The advantage of HECC is that they allow encryption with shorter operands and at the same time, they provide the same level of security as other public-key cryptosystems, based on the integer factorization problem (e.g. RSA) or the discrete logarithm problem in finite fields or Elliptic Curves. Shorter operands appear promising for applications in constrained environments. This work describes hardware architectures for HECC. We present efficient architectures to implement the necessary field operations and polynomial arithmetic in hardware, including architectures for the polynomial division and the calculation of the Extended Euclidean Algorithm in the polynomial ring. All architectures are speed and area optimized. To our knowledge, this is the first work that presents hardware architectures for the implementation of a HECC.
منابع مشابه
Software and hardware implementation of hyperelliptic curve cryptosystems
The hyperelliptic curve cryptosystem is one of the emerging cryptographic primitives of the last years. This system offers the same security as established public-key cryptosystems, such as those based on RSA or elliptic curves, with much shorter operand length. Consequently, this system allows highly efficient computation of the underlying field arithmetic. However, until recently the common b...
متن کاملImprovements of Addition Algorithm on Genus 3 Hyperelliptic Curves and Their Implementation
Genus 3 hyperelliptic curve cryptosystems are capable of fast-encryption on a 64-bit CPU, because a 56-bit field is enough for their definition fields. Recently, Kuroki et al. proposed an extension of the Harley algorithm, which had been known as the fastest addition algorithm of divisor classes on genus 2 hyperelliptic curves, on genus 3 hyperelliptic curves and Pelzl et al. improved the algor...
متن کاملDesign of Hyperelliptic Cryptosystems in Small Characteristic and a Software Implementation over F2n
We investigate the discrete logarithm problem over jacobians of hyperelliptic curves suitable for public-key cryptosystems. We focus on the case when the definition field has small characteristic 2, 3, 5 and 7, then we present hyperelliptic cryptosystems that resist against all known attacks. We further implement our designed hyperelliptic cryptosystems over finite fields F2n in software on Alp...
متن کاملInvalid-curve attacks on (hyper)elliptic curve cryptosystems
We extend the notion of an invalid-curve attack from elliptic curves to genus 2 hyperelliptic curves. We also show that invalid singular (hyper)elliptic curves can be used in mounting invalid-curve attacks on (hyper)elliptic curve cryptosystems, and make quantitative estimates of the practicality of these attacks. We thereby show that proper key validation is necessary even in cryptosystems bas...
متن کاملSome properties of $τ$-adic expansions on hyperelliptic Koblitz curves
This paper explores two techniques on a family of hyperelliptic curves that have been proposed to accelerate computation of scalar multiplication for hyperelliptic curve cryptosystems. In elliptic curve cryptosystems, it is known that Koblitz curves admit fast scalar multiplication, namely, the τ -adic non-adjacent form (τ -NAF). It is shown that the τ -NAF has the three properties: (1) existen...
متن کامل